Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
 

ECCouncil ECSS Exam Actual Questions

The questions for ECSS were last updated on Oct. 11, 2024.
  • Viewing page 1 out of 13 pages.
  • Viewing questions 1-4 out of 50 questions

Topic 1 - Exam A

Question #1 Topic 1

A security strategy in which several protection layers are placed throughout an information system helps to prevent direct attacks against an information system and data because a break in one layer only leads the attacker to the next layer. What is this security strategy called?

  • A. Network Security Zoning
  • B. Defense in Depth
  • C. Multi-aspect Model
  • D. Threat Modeling
Reveal Solution Hide Solution   Discussion   1

Correct Answer: B 🗳️

Question #2 Topic 1

Which of the following attack allows attackers to bypass client-ID security mechanisms and gain access privileges, and then inject malicious scripts into specific web pages?

  • A. Cross-Site Scripting (XSS)
  • B. Buffer Overflow
  • C. Denial-of-Service
  • D. Parameter/Form Tampering
Reveal Solution Hide Solution   Discussion  

Correct Answer: A 🗳️

Question #3 Topic 1

The security of the network can be increased in a number of ways, for instance, by installing a special kind of web server and through packet filtering. What type of server is implemented as an intermediary server between a client and a server to act as a shield and protect and hide the computer from the outside network?

  • A. Application Server
  • B. Telnet Server
  • C. Web Server
  • D. Proxy Server
Reveal Solution Hide Solution   Discussion  

Correct Answer: D 🗳️

Question #4 Topic 1

An algorithm which is a part of the U.S. government's long-term project to develop a set of standards for publicly available cryptography as authorized by the Computer Security Act of 1987 accepts a message of 264 bits in length and a 160-bit message output digest is produced to complicate text searching. Which of the following algorithms is a family of two similar hash functions, with different block sizes, and uses 32-bit words and 64-bit words?

  • A. SHA-2
  • B. SHA-0
  • C. SHA-1
  • D. SHA-3
Reveal Solution Hide Solution   Discussion   1

Correct Answer: C 🗳️

Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...